{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-3460","assignerOrgId":"4bb8329e-dd38-46c1-aafb-9bf32bcb93c6","state":"PUBLISHED","assignerShortName":"CERT-PL","dateReserved":"2024-04-08T10:30:35.750Z","datePublished":"2024-05-09T10:13:37.634Z","dateUpdated":"2024-08-01T20:12:06.924Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","platforms":["Windows"],"product":"Kioware","vendor":"Kioware","versions":[{"lessThanOrEqual":"8.34","status":"affected","version":"0","versionType":"semver"}]}],"credits":[{"lang":"en","type":"finder","value":"Maksymilian Kubiak [Afine Team]"}],"datePublic":"2024-05-09T10:00:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<span style=\"background-color: rgb(255, 255, 255);\">In KioWare for Windows (versions all <span style=\"background-color: rgb(255, 255, 255);\">through 8.34)</span>&nbsp;it is possible to exit this software&nbsp;<span style=\"background-color: rgb(255, 255, 255);\">and use other already opened applications utilizing a short time window before the forced automatic logout occurs. Then, by using some built-in function of these applications, one may launch any other programs.&nbsp;<br>In order to exploit this vulnerability external applications must be left running when the KioWare software is launched. Additionally, an attacker must know&nbsp;</span>the PIN set for this Kioware instance and also slow down the application with some specific task which extends the usable time window.</span><br><p><br></p>"}],"value":"In KioWare for Windows (versions all through 8.34) it is possible to exit this software and use other already opened applications utilizing a short time window before the forced automatic logout occurs. Then, by using some built-in function of these applications, one may launch any other programs. \nIn order to exploit this vulnerability external applications must be left running when the KioWare software is launched. Additionally, an attacker must know the PIN set for this Kioware instance and also slow down the application with some specific task which extends the usable time window.\n\n"}],"metrics":[{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"LOCAL","availabilityImpact":"HIGH","baseScore":7.4,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-424","description":"CWE-424 Improper Protection of Alternate Path","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"4bb8329e-dd38-46c1-aafb-9bf32bcb93c6","shortName":"CERT-PL","dateUpdated":"2024-05-09T10:14:30.190Z"},"references":[{"tags":["third-party-advisory"],"url":"https://cert.pl/posts/2024/04/CVE-2024-3459"},{"tags":["third-party-advisory"],"url":"https://cert.pl/en/posts/2024/04/CVE-2024-3459"},{"tags":["product"],"url":"https://www.kioware.com/"}],"source":{"discovery":"UNKNOWN"},"x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"affected":[{"vendor":"kioware","product":"kioware","cpes":["cpe:2.3:a:kioware:kioware:*:*:*:*:*:windows:*:*"],"defaultStatus":"unaffected","versions":[{"version":"0","status":"affected","lessThanOrEqual":"8.34","versionType":"semver"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-07-25T18:34:33.771027Z","id":"CVE-2024-3460","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-07-25T18:35:51.313Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-01T20:12:06.924Z"},"title":"CVE Program Container","references":[{"tags":["third-party-advisory","x_transferred"],"url":"https://cert.pl/posts/2024/04/CVE-2024-3459"},{"tags":["third-party-advisory","x_transferred"],"url":"https://cert.pl/en/posts/2024/04/CVE-2024-3459"},{"tags":["product","x_transferred"],"url":"https://www.kioware.com/"}]}]}}